Weekend Reads

* Email address obfuscation in 2026
https://spencermortensen.com/articles/email-obfuscation/
* Profile of Kimwolf botnet researcher
https://www.wsj.com/tech/kimwolf-hack-residential-proxy-networks-a712ab59?st=dHJ5oe
* Quantifying AI data center heat impacts
https://arxiv.org/abs/2603.20897
* Characterizing invalid routes via Tunnels
https://arxiv.org/abs/2603.29207
* Detecting anomalous topology, routes, and congestion
https://arxiv.org/abs/2603.25875

#EMail #Kimwolf #AI #RPKI #BGP

Email address obfuscation: What works in 2026?

🌗 BGP協定現在安全了嗎?
➤ 透過 RPKI 認證機制,築起網際網路路由的安全防線
https://isbgpsafeyet.com/
邊界閘道協定(BGP)作為網際網路的「郵政系統」,負責為數據選定最佳路徑,然而其先天設計缺乏安全性,導致全球網路經常面臨幹擾風險。Cloudflare 指出,唯有透過名為 RPKI 的認證體系,纔能有效防堵惡意路由注入。近年來,隨著全球各大電信商與網際網路服務供應商(ISP)如 Verizon、Comcast 與 Sparkle 等陸續加入防護行列,採用 RPKI 源位址驗證(Origin Validation)並過濾無效路由,網際網路的安全基石正在逐步強化。
+ 網路底層架構的演進總是異常緩慢,看到這麼多大型營運商終於開始過濾無效路徑,總算讓人對網際網路的可靠性稍微放心了一些。
+ RPKI 固然重要,但這終究是一個去中心化的挑戰,如果還有大型 ISP 不跟進,整個路由體系的脆弱點依然存在。
#網路安全 #路由安全 #BGP #RPKI
Is BGP safe yet? · Cloudflare

On the Internet, network devices exchange routes via a protocol called BGP (Border Gateway Protocol). Unfortunately, issues with BGP have led to malicious actors being able to hijack and misconfigure devices leading to security problems which have the potential to cause widespread problems. BGP security can be greatly improved by using technologies such as RPKI to sign Internet routes. This page attempts to track the progress of major Internet players (ISPs, transit operators, and content providers) in their progress to adopt RPKI and other technologies.

🚀 Ah, the noble quest to secure the Internet's mailman! 🌍 #BGP is still as safe as letting toddlers handle your bank transactions. But fear not, because #ISPs will definitely implement #RPKI and save the day...right after they solve world peace and cure aging. 😂
https://isbgpsafeyet.com/ #InternetSecurity #CyberSecurity #Humor #HackerNews #ngated
Is BGP safe yet? · Cloudflare

On the Internet, network devices exchange routes via a protocol called BGP (Border Gateway Protocol). Unfortunately, issues with BGP have led to malicious actors being able to hijack and misconfigure devices leading to security problems which have the potential to cause widespread problems. BGP security can be greatly improved by using technologies such as RPKI to sign Internet routes. This page attempts to track the progress of major Internet players (ISPs, transit operators, and content providers) in their progress to adopt RPKI and other technologies.

Last week I was in Stockholm for the route servers workshop organised by #Euro-IX. I presented my work on the #Debian packaging of software like #BIRD, #OpenBGPD and the #RPKI validators.

Slides are available at https://www.linux.it/~md/text/ixp-debian-rsws2026.pdf .

Interesting discussion about distribution / decentralization / de facto concentration of the #RPKI at #IETF125, which reminds me of discussions about the fediverse, Bluesky, etc.

To explore the #RPKI database: https://rpkiviews.org/

#IETF125

RPKIViews.org

Archiving all the world's RPKI data.

RPKIViews

"RPKI has been around for a while... more than a decade..."

🤔

🧐

😱

"more than a decade"??

... I remember when it began... 😃

#IETF #IETF125 #RPKI #RoutingSecurity #MANRS

"ARIN's Director of Customer Technical Services, Brad Gorman, is bringing RPKI expertise to the Toronto Network Operators Group's inaugural full-day conference."

Learn:
🔹 What RPKI actually does
🔹 Why it matters for YOUR network
🔹 How to deploy it safely
🔹 Where to start (no theory overload!)

See ARIN"S original post here: https://www.instagram.com/p/DV2VLbfDTN4/

Join us on April 13th and check out the full agenda here:

https://tornog.ca/events/tornog-1/agenda/

#TORNOG #RPKI #RoutingSecurity #Toronto #NetworkOperations

pqRPKI: A Practical RPKI Architecture for the Post-Quantum Era

The Resource Public Key Infrastructure (RPKI) secures Internet routing by binding IP prefixes to authorized Autonomous Systems, yet its RSA foundations are vulnerable to quantum adversaries. A naive swap to post-quantum (PQ) signatures (eg Falcon) is a poor fit for RPKI's bulk model: every relying party (RP) repeatedly fetches and validates the entire global repository, so larger keys and signatures inflate bandwidth and CPU cost, especially during a long dual-stack transition. We present pqRPKI , a post-quantum RPKI framework that pairs a multi-layer Merkle Tree Ladder (MTL) with RPKI objects, customized to relocate per-object verification material from certificates into the Manifest. To update RPKI for Merkle tree based schemes, pqRPKI redesign the RPKI manifest and delegation chain, introduces a ladder-guided sync and bulk-verification workflow that lets validators localize diffs top-down and rebuild trees bottom-up. pqRPKI also preserves current RPKI objects and encodings, supports both hosted and delegated operation, and provides an additive migration path that coexists with today's trust anchors for dual-stack deployment with little size overhead. Implemented as a working publication point (PP) and RPs, we show that pqRPKI reduces repository footprint to 546.8 MB on average (65.5%/83.1% smaller than Falcon/ML-DSA), cuts full-cycle validation to 102.7 s, and achieves 118.3 s end-to-end PP to Router time, enabling sub-2-minute operating cadences with full-repository validation each cycle. Dual-stack deployment with RSA only adds just 3.4% size overhead versus today's RPKI repositories.

arXiv.org

The agenda for TORNOG 1 is live! https://tornog.ca/events/tornog-1/agenda/

Join us for the the inaugural TORNOG full day conference on April 13th, at the MaRS Centre in Toronto!

#Toronto #RPKI #Fiber #IX #Sovereignty #AutonomousResilience #CloudNetwork #NetworkAutomation